Malware development – Welcome to the Dark Side: Part 2-2
In the previous parts of this blog series, I introduced the concept of writing a full-undetectable malware and about writing a client-side socket using […]
In the previous parts of this blog series, I introduced the concept of writing a full-undetectable malware and about writing a client-side socket using […]
Welcome to the second part of the malware development blog series. Here’s the link to Part 1. Given the length of Part 2, I have […]
If you are in cybersecurity, especially Red Teaming, writing a full-undetectable (FUD) malware is a great skill to have. Folks tend to use Metasploit combined […]
If you are a newbie in Penetration Testing and afraid of OSCP preparation, do not worry. Even I was once an amateur before starting on […]
Recently, on one of the security mailing lists a query was posted as to what metrics should be produced from a Data Leakage Prevention Solution, an […]
Heartbleed Advisory & FAQ Please find below a quick FAQ on the Heartbleed vulnerability and what you can to address it: UPDATE June 5, 2014: […]
Introduction Digital forensics methods are often used to uncover evidence from electronic devices to get information and verify validity of insurance claims. This is crucial […]
What is Information Rights Management? Information Rights Management is the set of techniques and methods which protect the highly sensitive information of the organization irrespective […]
What is Data Leakage Prevention? Data Leakage Prevention is the category of solutions which help an organization to apply controls for preventing the unwanted accidental […]
What is a DDoS based attack? A Distributed Denial-of-Service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its […]